SlideShare a Scribd company logo
1 of 54
Social Web
                                     Lecture 1I
                          What People DO on the Social Web?
                                     Lora Aroyo
                                   The Network Institute
                                  VU University Amsterdam




Monday, February 11, 13
Social
                 Relationships
Monday, February 11, 13
Social in Physical World

                    • People have relationships within and across
                          different social contexts: family, sports,
                          work, friends
                    • In ‘real world’ this is okay, it works the way
                          it does, due to a relatively small set of social
                          contexts and interaction opportunities


                          http://www.w3.org/2005/Incubator/socialweb/wiki/SocialWebFrameworks2#Social_Graph_Management_Today

Monday, February 11, 13
Social in Digital World
                    •     Digital social dynamics match those in the
                          physical world: friends are friends in both worlds
                    •     However, there are also significant differences:
                          •   # of people to interact with not limited by
                              distance or time
                          •   a person can ‘block’ or ‘manage’ relationships
                          •   personae subject to different social norms
                          •   personae can evolve over time
                          •   personae are less (not) limited in scope
Monday, February 11, 13
why do we share?




                          friends online vs offline
                                   world?




Monday, February 11, 13
Why Public Connections ...
                                  serve as important identity signals
                           help people navigate the networked social world
                          serve to validate identity information about people




Monday, February 11, 13
Ludy Rohling



                                         what is the driver for
                                               sharing?




   Social Networks
Serendipity vs. Privacy



Monday, February 11, 13
Multiple SN Accounts
                •         Users have many accounts on different social &
                          professional network services, e.g. personae for different
                          situations/contexts
                •         They utilize their different accounts in different ways,
                          depending on the digital context, e.g.:
                           •   friendly chat on Facebook
                           •   professional discussion on LinkedIn
                           •   dating interactions on Hives
                 As a consequence there is a need to separate the systems to
                 manage the user's profiles, identities & permissions, as well as
                 their social graph (relationships) & their social media

Monday, February 11, 13
Problems
                    •     Maintaining a multitude of online profiles for different
                          contexts is cumbersome and time consuming - not
                          scalable
                    •     It is difficult for new social networks to attract new &
                          maintain active members simply because of the effort
                          involved in creating and maintaining "yet-another-profile"
                          and re-establishing different aspects of your profile under
                          yet another context
                    •     A user cannot control how their information is viewed
                          by others in different contexts by different social
                          applications



Monday, February 11, 13
Architecture Needed
                for managing multiple
                 Social Web profiles

               “policy-oriented web”
             architecture to support
              trusted services in the
                   longer term




Monday, February 11, 13
For example ...
            •      In one system manage your personal information:
                          •   home address, telephone number, & best friends
                          •   your Friends Profile gets exposed to Hives and Twitter
            •      In another system manage work-related information:
                          •   office address, office telephone number, & work colleagues
                          •   your Work Profile gets exposed to Plaxo and LinkedIn


            •      Another choice could be to store your entire profile locally with a
                   trusted third party, and then
                          •   your Health Profile can be exposed to health care providers
                          •   your Citizen Profile can be exposed to government services

Monday, February 11, 13
Social Web User




                          http://www.w3.org/2005/Incubator/socialweb/wiki/SocialWebFrameworks2#Social_Graph_Management_Today
Monday, February 11, 13
Distributed Profile




                          http://www.w3.org/2005/Incubator/socialweb/wiki/SocialWebFrameworks2#Social_Graph_Management_Today
Monday, February 11, 13
Social Graph




                https://www.google.com/settings/me
                http://www.w3.org/2005/Incubator/socialweb/wiki/SocialWebFrameworks2#Social_Graph_Management_Today
Monday, February 11, 13
Social Groups




                          http://www.w3.org/2005/Incubator/socialweb/wiki/SocialWebFrameworks2#Social_Graph_Management_Today
Monday, February 11, 13
Frameworks




                          http://www.w3.org/2005/Incubator/socialweb/wiki/SocialWebFrameworks2#Social_Graph_Management_Today
Monday, February 11, 13
Personal
   Profiles




Monday, February 11, 13
Opening the Sites

Monday, February 11, 13
Opening the Sites
                   •      Demand from application developers to make
                          use of the amounts of Social Web data & make
                          their applications available to the site members
                   •      Demand from users to reuse data and
                          connections they have already established on
                          other sites, e.g. Google+ download your data,
                          Diaspora* download xml, download photos
                   •      In response: Facebook provided an API &
                          Google OpenSocial API


Monday, February 11, 13
•     an open, decentralized standard for authenticating
                          users that can be used for access control, allowing
                          users to log on to different services with the
                          same digital identity where these services trust
                          the authentication body
                    •     making sure the users are who they say they are
                    •     http://openid.net/
                    •     Initially: 2005, called Yadis (an acronym for "Yet
                          another distributed identity system")


Monday, February 11, 13
with OpenID, the process
  starts with the application
   asking the user for their
      identity (typically an
          openid URI)

                                http://openidexplained.com/
Monday, February 11, 13
OAuth
               •          an open protocol to allow secure API authorization in a
                          standard method for web applications; it enables users to
                          grant third-party access to their web resources without
                          sharing their passwords
               •          largely based on: Flickr’s API Auth & Google’s AuthSub
               •          limitations in terms of complexity, user experience, scale
               •          3 flows merged into one: web-based apps, desktop clients &
                          mobile/limited devices; e.g. when Facebook Connect existed -
                          flows for web apps, mobile devices & game consoles
               •          http://oauth.net/

Monday, February 11, 13
OAuth 2.0
                    •     OAuth 2.0 focuses on client developer simplicity - providing specific
                          authorization flows for web & desktop applications, mobile phones &
                          living room devices
                    •     not backwards compatible with previous versions
                    •     6 New Flows
                    •     http://oauth.net/2/
                                                                                    the application directly
                                                                                    requests a limited
                                                                                    access OAuth Token
                                                                                    (valet key) to access the
                                                                                    APIs (enter the house)
                                                                                    on user's behalf. If the
                                                                                    user can grant that
                                                                                    access, the application
                                                                                    can retrieve the unique
                                                                                    identifier for establishing
                                                                                    the profile (identity)
                                                                                    using the APIs.
Monday, February 11, 13
Twitter employing
                               OAuth




                                 Figure credits: http://www.phpbuilder.com/columns/sachin_khosla062510.php3
Monday, February 11, 13
Facebook Platform
                   •      Graph API - core of Facebook Platform, to read and write data
                          to Facebook (simple and consistent view of the social graph)
                   •      Open Graph - defining Actions and Objects
                   •      Facebook Query Language (FQL) - SQL-style interface to query
                          the data exposed by the Graph API
                   •      Authentication (now Facebook Login) - interact with Graph API
                          on behalf of Facebook users (single-sign on mechanism for
                          web, mobile & desktop apps)
                   •      Social Plugins, Facebook Payments, Ads API, Chat API (via
                          Jabber/XMPP service), JavaScript SDK
                   •      Depreciated: REST API, FBML, and the old Javascript API,
                          Facebook Connect APIs
Monday, February 11, 13
•     open standards-based (e.g. JavaScript, HTML) component
                          model for cloud based social apps
                    •     Google initiative (set of APIs) in 2007:
                          •   People & Friends API (people and relationship information)

                          •   Activities API (publishing & accessing user activity information)

                          •   Persistence API (simple key-value pair data for server-free stateful
                              applications)

                    •     with Open Social embedded in a site, a site instantly
                          becomes a social Web site (initially running only at Orkut)
                    •     integrated, e.g. OAuth, OAuth 2.0, Activity Streams
                    •     http://www.opensocial.org/
Monday, February 11, 13
OpenSocial
                        •     Half a year after Facebook Platform, Google launched Open Social
                        •     Popular containers (initially): MySpace, Hi5, Plaxo, LinkedIn, Orkut,
                              Friendster, Six Apart
                              •   http://opensocial.org/category/showcase/ (currently)
                        •     Plugged-in applications: iLike, Slide, Flixter, Rock You, etc.
                        •     https://github.com/opensocial

•       Apache Shinding: reference implementation of
        OpenSocial Specification (Social Network APIs):

•       Apache Rave: lightweight extendible platform for
        using, integrating & hosting OpenSocial and W3C
        Widget services (context-aware personalization,
        collaboration & content integration capabilities)
    Monday, February 11, 13
Twitter APIs
                    • The Twitter platform offers access to the
                          data of more than 200 million tweets a day,
                          via different APIs
                    • Each API represents a facet of Twitter
                    • These APIs are constantly evolving, and
                          developers have to be aware of that
                    • http://dev.twitter.com
Monday, February 11, 13
REST API
                    •     the API for leveraging core Twitter objects
                    •     enables developers to access the core primitives of
                          Twitter including timelines, status updates & user
                          information, etc.
                    •     RESTful API calls to build a profile of a user: user name,
                          user Twitter handle, user profile avatar & the graph of
                          people that user is following on Twitter
                    •     enables developers integration opportunities to interact
                          with Twitter: create & post tweets back to Twitter, reply to
                          tweets, favorite certain tweets, retweet other tweets, etc.


Monday, February 11, 13
Streaming API
                    •     real-time sample of the Twitter Firehose
                    •     for developers with data intensive needs, e.g. to build a data mining product or do
                          analytics research
                    •     allows for large quantities of keywords to be specified and tracked, retrieving geo-
                          tagged tweets from a certain region, or have the public statuses of a user set
                          returned
                    •     Public streams: public data flowing through Twitter. The primary use case is
                          following specific users or topics, and data mining, e.g. public statuses from all
                          users, filtered in various ways: by userid, keyword, geographic location
                    •     User streams: single-user streams (all data for a single user's view of Twitter;
                          Requires the user's OAuth token); The primary use case is providing updates to a
                          Twitter client
                    •     Site streams: multi-user version of user streams (for servers to connect to Twitter
                          on behalf of many users); The primary use case is website and other service
                          integrations
                    •     Connecting to the streaming API requires keeping a persistent HTTP connection
                          open (different than the REST API)

Monday, February 11, 13
Search API
                    •     Dedicated API for running searches against the real-time index
                          of recent Tweets; to allow a user to query for Twitter content:
                          •   a set of tweets with specific keywords,
                          •   tweets referencing a specific user,
                          •   tweets from a particular user
                    •     to access to data around Trends
                    •     it’s limited, e.g. index of only recent tweets (6-9 days); no
                          authentication: all queries are made anonymously; some tweets
                          & users may be missing from search results (focus on
                          relevance)



Monday, February 11, 13
Twitter for Websites
                    • TfW: a set of products that enables websites
                          to easily integrate Twitter basic functions
                          • Tweet button
                          • Follow button
                          • Embedded Tweets

      https://dev.twitter.com/docs/twitter-for-websites
Monday, February 11, 13
Issues related to User
                       Profiles & Networks



Monday, February 11, 13
Privacy Concerns
                    •     Legal still in its infancy, but courts do rule on new behavior
                    •     fourth amendment to the U.S. Constitution & legal
                          decisions concerning privacy are not equipped to address
                          social network sites
                    •     e.g., do police officers have the right to access content
                          posted to Facebook without a warrant?
                    •     Truthfulness of personal profiles has become a subject of
                          debate
                    •     Privacy hard to understand (few read Terms) and
                          misinterpret ‘Friends’



Monday, February 11, 13
Security
                    • security of people (sex offenders)
                    • security of computers and data
                     • With enormous numbers of users and
                          enormous amounts of data, sites are
                          natural targets of spammers, and phishing
                          and malware attacks (‘new friend
                          malware’, ‘twitter spam’ etc.)


Monday, February 11, 13
Monday, February 11, 13
Monday, February 11, 13
Monday, February 11, 13
Thijs Kloosterman

      SNS for improving
        offline society
               Reinier Kop




                                             government
                                             protection vs.
                                               learning

Monday, February 11, 13
Bill of Rights
                    •     Fundamental aspects to consider for users of Social Web:
                          •   Ownership of their own personal information,
                              including:
                              •   their own profile data
                              •   the list of people they are connected to
                              •   the activity stream of content they create
                          •   Control of whether & how personal information is
                              shared with others
                          •   Freedom to grant persistent access to their personal
                              information to trusted external sites

                                                               http://opensocialweb.org/2007/09/05/bill-of-rights/

Monday, February 11, 13
http://www.economist.com/blogs/babbage/2012/01/online-privacy




                     27-01-2012




        “Having figured out how to
       remember nearly everything,               Issues:
          it is about time people                • burden on companies: it is next to
         relearned how to forget”                   impossible to rid the web completely
                                                    of a piece of information: some
                                                    digital ripples will inevitably remain

          “Personal data is the new oil          • where one man’s data end and
                                                    another’s begin
          of the internet and the new
             currency of the digital             • crooks may try to invoke it to have
                                                    their name struck from unfavorable
                     world.”                        online coverage
             Meglena Kuneva, European
                                                 • it is not always clear what counts as
           Consumer Commissioner, 2009              reporting on the internet

Monday, February 11, 13
current laws not
                                               working?




                                           media vs. piracy
                          Egemen Uzunali




Monday, February 11, 13
Privacy:
             Awareness not Paranoia
     "privacy paradox" = lack of awareness
         of the public nature of Internet

            flexibility to handle friends with
            different conceptions of privacy

      ability to control data flow inside and
                  outside network

       realize that sensitive information can
                 be reconstructed



Monday, February 11, 13
Current Public Initiatives
                                      SOPA, PIPA, ACTA
                          •   By media industry:
                              • AHRA 1992 - soft
                              • DMCA 1998 - surgical
                              • SOPA/PIPA 2011 - nuclear
                          •   By non representatives
                              • ACTA - 39 countries




Monday, February 11, 13
Monday, February 11, 13
Monday, February 11, 13
Monday, February 11, 13
Monday, February 11, 13
http://thenextweb.com/twitter/2012/01/27/twitter-isnt-censoring-you-your-government-is/
Monday, February 11, 13
are we really producers? Is it really social?
Monday, February 11, 13
“Carr argues that the Internet physically "rewires" our brain to where we end up acting like
   computers — avaricious gobblers of information –- and our grip on what it means to be
   human slackens.”



                                                                         Richard Foreman, playwright




                                                           2008




                                                                           2010
Monday, February 11, 13
Assignment 1




                          image source: http://www.flickr.com/photos/bionicteaching/1375254387/
Monday, February 11, 13
•       Provide analysis of privacy issues on the (Social) Web
                •         three articles <--> three mind maps <--> main Social Web privacy issues
                •         write for people who didn’t attend the course (max 3 pages)
          •       Provide analysis of current privacy-related public initiatives
                •         legal contexts for privacy and ownership
                •         compare the intentions of both initiatives (advantages & disadvantages)
                •         your own vision on how this impacts the future of the social web
                •         your own advise to policy makers with regards to privacy on the web.
                •         links to Net Neutrality
          •       link to Hands-on session: what would change if SOPA/PIPA or ACTA
                  were active – would you still have access to the information you pulled in
                  for the assignments? Illustrate your answer showing what changes could
                  appear in the graph from exercise 4 (Hands-on session 2) and explain
                  why. (max 1 page)
          •       all visuals, e.g. screenshots, diagrams, etc. in appendix and use template 
          •       Deadline: 22 February 23:59

Monday, February 11, 13
Hands-on Teaser
   •       Installations
         •       Python 2.6 or 2.7
         •       Python packages: json, facebook, uurllib2
         •       JavaScript Info Vis Toolkit (jit.zip)
         •       Facebook Developers app

   •       Experience OAuth
   •       Query the Facebook Open Graph
   •       Visualize your Facebook social network
           in various ways
                                                       image source: http://www.flickr.com/photos/bionicteaching/1375254387/
Monday, February 11, 13

More Related Content

What's hot

Breaking Down Walls in Enterprise with Social Semantics
Breaking Down Walls in Enterprise with Social SemanticsBreaking Down Walls in Enterprise with Social Semantics
Breaking Down Walls in Enterprise with Social SemanticsJohn Breslin
 
Advantages and disadvantages of web 2.0
Advantages and disadvantages of web 2.0Advantages and disadvantages of web 2.0
Advantages and disadvantages of web 2.0Carina Mano
 
Imaging and design for online environment group 1 tv5
Imaging and design for online environment group 1 tv5Imaging and design for online environment group 1 tv5
Imaging and design for online environment group 1 tv5Eleazhar Cabral
 
Intro talk social media for pg researchers
Intro talk social media for pg researchersIntro talk social media for pg researchers
Intro talk social media for pg researchersD510879
 
Web 1.0, Web 2.0 & Web 3.0
Web 1.0, Web 2.0 & Web 3.0Web 1.0, Web 2.0 & Web 3.0
Web 1.0, Web 2.0 & Web 3.0tokey_sport
 
TELECOM Bretagne Social Web and Web 2.0 25 janvier 2012
TELECOM Bretagne Social Web and Web 2.0 25 janvier 2012TELECOM Bretagne Social Web and Web 2.0 25 janvier 2012
TELECOM Bretagne Social Web and Web 2.0 25 janvier 2012Daniel Dufourt
 
Web 2.0: Implications for Library Services
Web 2.0: Implications for Library ServicesWeb 2.0: Implications for Library Services
Web 2.0: Implications for Library ServicesADINET Ahmedabad
 
Lesson 1: Intoduction to ICT
Lesson 1: Intoduction to ICTLesson 1: Intoduction to ICT
Lesson 1: Intoduction to ICTLyka Larita
 
Web2 UKOLN MLA Workshop
Web2 UKOLN MLA WorkshopWeb2 UKOLN MLA Workshop
Web2 UKOLN MLA WorkshopUKOLN_MLA
 
Advantages & disadvantages of web 1.0 vs web 2.0
Advantages & disadvantages of web 1.0  vs web 2.0Advantages & disadvantages of web 1.0  vs web 2.0
Advantages & disadvantages of web 1.0 vs web 2.0Nifras Ismail
 
Bonsai Networking: pruning your professional learning network (VU Seminar)
Bonsai Networking: pruning your professional learning network (VU Seminar)Bonsai Networking: pruning your professional learning network (VU Seminar)
Bonsai Networking: pruning your professional learning network (VU Seminar)Joyce Seitzinger
 
Strategies and implementation of web 2.0 in the mining industry
Strategies and implementation of web 2.0 in the mining industryStrategies and implementation of web 2.0 in the mining industry
Strategies and implementation of web 2.0 in the mining industryZoeMM
 
Web 2.0, library 2.0, librarian 2.0, innovative services for sustainable car...
Web 2.0, library 2.0, librarian 2.0,  innovative services for sustainable car...Web 2.0, library 2.0, librarian 2.0,  innovative services for sustainable car...
Web 2.0, library 2.0, librarian 2.0, innovative services for sustainable car...Cheryl Peltier-Davis
 
6-7-2011 Objects Engagement and Web 2.0 - PEMCI
6-7-2011 Objects Engagement and Web 2.0 - PEMCI6-7-2011 Objects Engagement and Web 2.0 - PEMCI
6-7-2011 Objects Engagement and Web 2.0 - PEMCIMathieu Plourde
 
Blogs, Wikis and more: Web 2.0 demystified for information professionals
Blogs, Wikis and more: Web 2.0 demystified for information professionalsBlogs, Wikis and more: Web 2.0 demystified for information professionals
Blogs, Wikis and more: Web 2.0 demystified for information professionalsMarieke Guy
 

What's hot (20)

Breaking Down Walls in Enterprise with Social Semantics
Breaking Down Walls in Enterprise with Social SemanticsBreaking Down Walls in Enterprise with Social Semantics
Breaking Down Walls in Enterprise with Social Semantics
 
Advantages and disadvantages of web 2.0
Advantages and disadvantages of web 2.0Advantages and disadvantages of web 2.0
Advantages and disadvantages of web 2.0
 
Imaging and design for online environment group 1 tv5
Imaging and design for online environment group 1 tv5Imaging and design for online environment group 1 tv5
Imaging and design for online environment group 1 tv5
 
Intro talk social media for pg researchers
Intro talk social media for pg researchersIntro talk social media for pg researchers
Intro talk social media for pg researchers
 
Web 1.0, Web 2.0 & Web 3.0
Web 1.0, Web 2.0 & Web 3.0Web 1.0, Web 2.0 & Web 3.0
Web 1.0, Web 2.0 & Web 3.0
 
TELECOM Bretagne Social Web and Web 2.0 25 janvier 2012
TELECOM Bretagne Social Web and Web 2.0 25 janvier 2012TELECOM Bretagne Social Web and Web 2.0 25 janvier 2012
TELECOM Bretagne Social Web and Web 2.0 25 janvier 2012
 
Web 1.0, 2.0 & 3.0
Web 1.0, 2.0 & 3.0Web 1.0, 2.0 & 3.0
Web 1.0, 2.0 & 3.0
 
Web 2.0: Implications for Library Services
Web 2.0: Implications for Library ServicesWeb 2.0: Implications for Library Services
Web 2.0: Implications for Library Services
 
Lesson 1: Intoduction to ICT
Lesson 1: Intoduction to ICTLesson 1: Intoduction to ICT
Lesson 1: Intoduction to ICT
 
Web2 UKOLN MLA Workshop
Web2 UKOLN MLA WorkshopWeb2 UKOLN MLA Workshop
Web2 UKOLN MLA Workshop
 
Advantages & disadvantages of web 1.0 vs web 2.0
Advantages & disadvantages of web 1.0  vs web 2.0Advantages & disadvantages of web 1.0  vs web 2.0
Advantages & disadvantages of web 1.0 vs web 2.0
 
Bonsai Networking: pruning your professional learning network (VU Seminar)
Bonsai Networking: pruning your professional learning network (VU Seminar)Bonsai Networking: pruning your professional learning network (VU Seminar)
Bonsai Networking: pruning your professional learning network (VU Seminar)
 
Veb 2.0 rečnik, brošura
Veb 2.0 rečnik, brošuraVeb 2.0 rečnik, brošura
Veb 2.0 rečnik, brošura
 
Social Networking: Communities for Christ
Social Networking: Communities for ChristSocial Networking: Communities for Christ
Social Networking: Communities for Christ
 
Strategies and implementation of web 2.0 in the mining industry
Strategies and implementation of web 2.0 in the mining industryStrategies and implementation of web 2.0 in the mining industry
Strategies and implementation of web 2.0 in the mining industry
 
Inn530 ass2 7.6
Inn530 ass2 7.6Inn530 ass2 7.6
Inn530 ass2 7.6
 
Web 2.0
Web 2.0 Web 2.0
Web 2.0
 
Web 2.0, library 2.0, librarian 2.0, innovative services for sustainable car...
Web 2.0, library 2.0, librarian 2.0,  innovative services for sustainable car...Web 2.0, library 2.0, librarian 2.0,  innovative services for sustainable car...
Web 2.0, library 2.0, librarian 2.0, innovative services for sustainable car...
 
6-7-2011 Objects Engagement and Web 2.0 - PEMCI
6-7-2011 Objects Engagement and Web 2.0 - PEMCI6-7-2011 Objects Engagement and Web 2.0 - PEMCI
6-7-2011 Objects Engagement and Web 2.0 - PEMCI
 
Blogs, Wikis and more: Web 2.0 demystified for information professionals
Blogs, Wikis and more: Web 2.0 demystified for information professionalsBlogs, Wikis and more: Web 2.0 demystified for information professionals
Blogs, Wikis and more: Web 2.0 demystified for information professionals
 

Similar to Lecture 2: Social Web Privacy and User Profiles (2013)

Lecture 2: Social Web Privacy &amp; User Profiles (2012)
Lecture 2: Social Web Privacy &amp; User Profiles (2012)Lecture 2: Social Web Privacy &amp; User Profiles (2012)
Lecture 2: Social Web Privacy &amp; User Profiles (2012)Lora Aroyo
 
Lecture 2: Interactions, Frameworks, Privacy & Security on the Social Web (2014)
Lecture 2: Interactions, Frameworks, Privacy & Security on the Social Web (2014)Lecture 2: Interactions, Frameworks, Privacy & Security on the Social Web (2014)
Lecture 2: Interactions, Frameworks, Privacy & Security on the Social Web (2014)Lora Aroyo
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guideYury Chemerkin
 
Social networking
Social networkingSocial networking
Social networkingJohan Koren
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.Yury Chemerkin
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Open University Australia
 
Lesson 1. Introduction to ICT.pptx
Lesson 1. Introduction to ICT.pptxLesson 1. Introduction to ICT.pptx
Lesson 1. Introduction to ICT.pptxJasonbaloro
 
Enterprise social networking v1.2
Enterprise social networking v1.2Enterprise social networking v1.2
Enterprise social networking v1.2James Sutter
 
Social networking website
Social networking websiteSocial networking website
Social networking websitekamaljune
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Lecture2: What People Do on the Social Web (VU Amsterdam Social Web Course)
Lecture2: What People Do on the Social Web (VU Amsterdam Social Web Course)Lecture2: What People Do on the Social Web (VU Amsterdam Social Web Course)
Lecture2: What People Do on the Social Web (VU Amsterdam Social Web Course)Lora Aroyo
 
VU University Amsterdam - The Social Web 2016 - Lecture 2
VU University Amsterdam - The Social Web 2016 - Lecture 2VU University Amsterdam - The Social Web 2016 - Lecture 2
VU University Amsterdam - The Social Web 2016 - Lecture 2Davide Ceolin
 
Lecture 3: Vocabularies & Data Formats on the Social Web (2014)
Lecture 3: Vocabularies & Data Formats on the Social Web (2014)Lecture 3: Vocabularies & Data Formats on the Social Web (2014)
Lecture 3: Vocabularies & Data Formats on the Social Web (2014)Lora Aroyo
 
Lecture 6: How do we study the Social Web (2013)
Lecture 6: How do we study the Social Web  (2013)Lecture 6: How do we study the Social Web  (2013)
Lecture 6: How do we study the Social Web (2013)Lora Aroyo
 
empowermenttechnologies-module1-.pptx
empowermenttechnologies-module1-.pptxempowermenttechnologies-module1-.pptx
empowermenttechnologies-module1-.pptxrazielyurag
 
Putting 2.0 to Work for You
Putting 2.0 to Work for YouPutting 2.0 to Work for You
Putting 2.0 to Work for YouBobbi Newman
 

Similar to Lecture 2: Social Web Privacy and User Profiles (2013) (20)

Lecture 2: Social Web Privacy &amp; User Profiles (2012)
Lecture 2: Social Web Privacy &amp; User Profiles (2012)Lecture 2: Social Web Privacy &amp; User Profiles (2012)
Lecture 2: Social Web Privacy &amp; User Profiles (2012)
 
Lecture 2: Interactions, Frameworks, Privacy & Security on the Social Web (2014)
Lecture 2: Interactions, Frameworks, Privacy & Security on the Social Web (2014)Lecture 2: Interactions, Frameworks, Privacy & Security on the Social Web (2014)
Lecture 2: Interactions, Frameworks, Privacy & Security on the Social Web (2014)
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guide
 
Social networking
Social networkingSocial networking
Social networking
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?
 
Lesson 1. Introduction to ICT.pptx
Lesson 1. Introduction to ICT.pptxLesson 1. Introduction to ICT.pptx
Lesson 1. Introduction to ICT.pptx
 
Enterprise social networking v1.2
Enterprise social networking v1.2Enterprise social networking v1.2
Enterprise social networking v1.2
 
Social networking website
Social networking websiteSocial networking website
Social networking website
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
E-tech lesson 1.pptx
E-tech lesson 1.pptxE-tech lesson 1.pptx
E-tech lesson 1.pptx
 
Lecture2: What People Do on the Social Web (VU Amsterdam Social Web Course)
Lecture2: What People Do on the Social Web (VU Amsterdam Social Web Course)Lecture2: What People Do on the Social Web (VU Amsterdam Social Web Course)
Lecture2: What People Do on the Social Web (VU Amsterdam Social Web Course)
 
Ppt
PptPpt
Ppt
 
Emptech Lesson 1.pptx
Emptech Lesson 1.pptxEmptech Lesson 1.pptx
Emptech Lesson 1.pptx
 
Web 2.0, Web Social
Web 2.0, Web SocialWeb 2.0, Web Social
Web 2.0, Web Social
 
VU University Amsterdam - The Social Web 2016 - Lecture 2
VU University Amsterdam - The Social Web 2016 - Lecture 2VU University Amsterdam - The Social Web 2016 - Lecture 2
VU University Amsterdam - The Social Web 2016 - Lecture 2
 
Lecture 3: Vocabularies & Data Formats on the Social Web (2014)
Lecture 3: Vocabularies & Data Formats on the Social Web (2014)Lecture 3: Vocabularies & Data Formats on the Social Web (2014)
Lecture 3: Vocabularies & Data Formats on the Social Web (2014)
 
Lecture 6: How do we study the Social Web (2013)
Lecture 6: How do we study the Social Web  (2013)Lecture 6: How do we study the Social Web  (2013)
Lecture 6: How do we study the Social Web (2013)
 
empowermenttechnologies-module1-.pptx
empowermenttechnologies-module1-.pptxempowermenttechnologies-module1-.pptx
empowermenttechnologies-module1-.pptx
 
Putting 2.0 to Work for You
Putting 2.0 to Work for YouPutting 2.0 to Work for You
Putting 2.0 to Work for You
 

More from Lora Aroyo

NeurIPS2023 Keynote: The Many Faces of Responsible AI.pdf
NeurIPS2023 Keynote: The Many Faces of Responsible AI.pdfNeurIPS2023 Keynote: The Many Faces of Responsible AI.pdf
NeurIPS2023 Keynote: The Many Faces of Responsible AI.pdfLora Aroyo
 
CATS4ML Data Challenge: Crowdsourcing Adverse Test Sets for Machine Learning
CATS4ML Data Challenge: Crowdsourcing Adverse Test Sets for Machine LearningCATS4ML Data Challenge: Crowdsourcing Adverse Test Sets for Machine Learning
CATS4ML Data Challenge: Crowdsourcing Adverse Test Sets for Machine LearningLora Aroyo
 
Harnessing Human Semantics at Scale (updated)
Harnessing Human Semantics at Scale (updated)Harnessing Human Semantics at Scale (updated)
Harnessing Human Semantics at Scale (updated)Lora Aroyo
 
Data excellence: Better data for better AI
Data excellence: Better data for better AIData excellence: Better data for better AI
Data excellence: Better data for better AILora Aroyo
 
CHIP Demonstrator presentation @ CATCH Symposium
CHIP Demonstrator presentation @ CATCH SymposiumCHIP Demonstrator presentation @ CATCH Symposium
CHIP Demonstrator presentation @ CATCH SymposiumLora Aroyo
 
Semantic Web Challenge: CHIP Demonstrator
Semantic Web Challenge: CHIP DemonstratorSemantic Web Challenge: CHIP Demonstrator
Semantic Web Challenge: CHIP DemonstratorLora Aroyo
 
The Rijksmuseum Collection as Linked Data
The Rijksmuseum Collection as Linked DataThe Rijksmuseum Collection as Linked Data
The Rijksmuseum Collection as Linked DataLora Aroyo
 
Keynote at International Conference of Art Libraries 2018 @Rijksmuseum
Keynote at International Conference of Art Libraries 2018 @RijksmuseumKeynote at International Conference of Art Libraries 2018 @Rijksmuseum
Keynote at International Conference of Art Libraries 2018 @RijksmuseumLora Aroyo
 
FAIRview: Responsible Video Summarization @NYCML'18
FAIRview: Responsible Video Summarization @NYCML'18FAIRview: Responsible Video Summarization @NYCML'18
FAIRview: Responsible Video Summarization @NYCML'18Lora Aroyo
 
Understanding bias in video news & news filtering algorithms
Understanding bias in video news & news filtering algorithmsUnderstanding bias in video news & news filtering algorithms
Understanding bias in video news & news filtering algorithmsLora Aroyo
 
StorySourcing: Telling Stories with Humans & Machines
StorySourcing: Telling Stories with Humans & MachinesStorySourcing: Telling Stories with Humans & Machines
StorySourcing: Telling Stories with Humans & MachinesLora Aroyo
 
Data Science with Humans in the Loop
Data Science with Humans in the LoopData Science with Humans in the Loop
Data Science with Humans in the LoopLora Aroyo
 
Digital Humanities Benelux 2017: Keynote Lora Aroyo
Digital Humanities Benelux 2017: Keynote Lora AroyoDigital Humanities Benelux 2017: Keynote Lora Aroyo
Digital Humanities Benelux 2017: Keynote Lora AroyoLora Aroyo
 
DH Benelux 2017 Panel: A Pragmatic Approach to Understanding and Utilising Ev...
DH Benelux 2017 Panel: A Pragmatic Approach to Understanding and Utilising Ev...DH Benelux 2017 Panel: A Pragmatic Approach to Understanding and Utilising Ev...
DH Benelux 2017 Panel: A Pragmatic Approach to Understanding and Utilising Ev...Lora Aroyo
 
Crowdsourcing ambiguity aware ground truth - collective intelligence 2017
Crowdsourcing ambiguity aware ground truth - collective intelligence 2017Crowdsourcing ambiguity aware ground truth - collective intelligence 2017
Crowdsourcing ambiguity aware ground truth - collective intelligence 2017Lora Aroyo
 
My ESWC 2017 keynote: Disrupting the Semantic Comfort Zone
My ESWC 2017 keynote: Disrupting the Semantic Comfort ZoneMy ESWC 2017 keynote: Disrupting the Semantic Comfort Zone
My ESWC 2017 keynote: Disrupting the Semantic Comfort ZoneLora Aroyo
 
Data Science with Human in the Loop @Faculty of Science #Leiden University
Data Science with Human in the Loop @Faculty of Science #Leiden UniversityData Science with Human in the Loop @Faculty of Science #Leiden University
Data Science with Human in the Loop @Faculty of Science #Leiden UniversityLora Aroyo
 
SXSW2017 @NewDutchMedia Talk: Exploration is the New Search
SXSW2017 @NewDutchMedia Talk: Exploration is the New SearchSXSW2017 @NewDutchMedia Talk: Exploration is the New Search
SXSW2017 @NewDutchMedia Talk: Exploration is the New SearchLora Aroyo
 
Europeana GA 2016: Harnessing Crowds, Niches & Professionals in the Digital Age
Europeana GA 2016: Harnessing Crowds, Niches & Professionals  in the Digital AgeEuropeana GA 2016: Harnessing Crowds, Niches & Professionals  in the Digital Age
Europeana GA 2016: Harnessing Crowds, Niches & Professionals in the Digital AgeLora Aroyo
 
"Video Killed the Radio Star": From MTV to Snapchat
"Video Killed the Radio Star": From MTV to Snapchat"Video Killed the Radio Star": From MTV to Snapchat
"Video Killed the Radio Star": From MTV to SnapchatLora Aroyo
 

More from Lora Aroyo (20)

NeurIPS2023 Keynote: The Many Faces of Responsible AI.pdf
NeurIPS2023 Keynote: The Many Faces of Responsible AI.pdfNeurIPS2023 Keynote: The Many Faces of Responsible AI.pdf
NeurIPS2023 Keynote: The Many Faces of Responsible AI.pdf
 
CATS4ML Data Challenge: Crowdsourcing Adverse Test Sets for Machine Learning
CATS4ML Data Challenge: Crowdsourcing Adverse Test Sets for Machine LearningCATS4ML Data Challenge: Crowdsourcing Adverse Test Sets for Machine Learning
CATS4ML Data Challenge: Crowdsourcing Adverse Test Sets for Machine Learning
 
Harnessing Human Semantics at Scale (updated)
Harnessing Human Semantics at Scale (updated)Harnessing Human Semantics at Scale (updated)
Harnessing Human Semantics at Scale (updated)
 
Data excellence: Better data for better AI
Data excellence: Better data for better AIData excellence: Better data for better AI
Data excellence: Better data for better AI
 
CHIP Demonstrator presentation @ CATCH Symposium
CHIP Demonstrator presentation @ CATCH SymposiumCHIP Demonstrator presentation @ CATCH Symposium
CHIP Demonstrator presentation @ CATCH Symposium
 
Semantic Web Challenge: CHIP Demonstrator
Semantic Web Challenge: CHIP DemonstratorSemantic Web Challenge: CHIP Demonstrator
Semantic Web Challenge: CHIP Demonstrator
 
The Rijksmuseum Collection as Linked Data
The Rijksmuseum Collection as Linked DataThe Rijksmuseum Collection as Linked Data
The Rijksmuseum Collection as Linked Data
 
Keynote at International Conference of Art Libraries 2018 @Rijksmuseum
Keynote at International Conference of Art Libraries 2018 @RijksmuseumKeynote at International Conference of Art Libraries 2018 @Rijksmuseum
Keynote at International Conference of Art Libraries 2018 @Rijksmuseum
 
FAIRview: Responsible Video Summarization @NYCML'18
FAIRview: Responsible Video Summarization @NYCML'18FAIRview: Responsible Video Summarization @NYCML'18
FAIRview: Responsible Video Summarization @NYCML'18
 
Understanding bias in video news & news filtering algorithms
Understanding bias in video news & news filtering algorithmsUnderstanding bias in video news & news filtering algorithms
Understanding bias in video news & news filtering algorithms
 
StorySourcing: Telling Stories with Humans & Machines
StorySourcing: Telling Stories with Humans & MachinesStorySourcing: Telling Stories with Humans & Machines
StorySourcing: Telling Stories with Humans & Machines
 
Data Science with Humans in the Loop
Data Science with Humans in the LoopData Science with Humans in the Loop
Data Science with Humans in the Loop
 
Digital Humanities Benelux 2017: Keynote Lora Aroyo
Digital Humanities Benelux 2017: Keynote Lora AroyoDigital Humanities Benelux 2017: Keynote Lora Aroyo
Digital Humanities Benelux 2017: Keynote Lora Aroyo
 
DH Benelux 2017 Panel: A Pragmatic Approach to Understanding and Utilising Ev...
DH Benelux 2017 Panel: A Pragmatic Approach to Understanding and Utilising Ev...DH Benelux 2017 Panel: A Pragmatic Approach to Understanding and Utilising Ev...
DH Benelux 2017 Panel: A Pragmatic Approach to Understanding and Utilising Ev...
 
Crowdsourcing ambiguity aware ground truth - collective intelligence 2017
Crowdsourcing ambiguity aware ground truth - collective intelligence 2017Crowdsourcing ambiguity aware ground truth - collective intelligence 2017
Crowdsourcing ambiguity aware ground truth - collective intelligence 2017
 
My ESWC 2017 keynote: Disrupting the Semantic Comfort Zone
My ESWC 2017 keynote: Disrupting the Semantic Comfort ZoneMy ESWC 2017 keynote: Disrupting the Semantic Comfort Zone
My ESWC 2017 keynote: Disrupting the Semantic Comfort Zone
 
Data Science with Human in the Loop @Faculty of Science #Leiden University
Data Science with Human in the Loop @Faculty of Science #Leiden UniversityData Science with Human in the Loop @Faculty of Science #Leiden University
Data Science with Human in the Loop @Faculty of Science #Leiden University
 
SXSW2017 @NewDutchMedia Talk: Exploration is the New Search
SXSW2017 @NewDutchMedia Talk: Exploration is the New SearchSXSW2017 @NewDutchMedia Talk: Exploration is the New Search
SXSW2017 @NewDutchMedia Talk: Exploration is the New Search
 
Europeana GA 2016: Harnessing Crowds, Niches & Professionals in the Digital Age
Europeana GA 2016: Harnessing Crowds, Niches & Professionals  in the Digital AgeEuropeana GA 2016: Harnessing Crowds, Niches & Professionals  in the Digital Age
Europeana GA 2016: Harnessing Crowds, Niches & Professionals in the Digital Age
 
"Video Killed the Radio Star": From MTV to Snapchat
"Video Killed the Radio Star": From MTV to Snapchat"Video Killed the Radio Star": From MTV to Snapchat
"Video Killed the Radio Star": From MTV to Snapchat
 

Lecture 2: Social Web Privacy and User Profiles (2013)

  • 1. Social Web Lecture 1I What People DO on the Social Web? Lora Aroyo The Network Institute VU University Amsterdam Monday, February 11, 13
  • 2. Social Relationships Monday, February 11, 13
  • 3. Social in Physical World • People have relationships within and across different social contexts: family, sports, work, friends • In ‘real world’ this is okay, it works the way it does, due to a relatively small set of social contexts and interaction opportunities http://www.w3.org/2005/Incubator/socialweb/wiki/SocialWebFrameworks2#Social_Graph_Management_Today Monday, February 11, 13
  • 4. Social in Digital World • Digital social dynamics match those in the physical world: friends are friends in both worlds • However, there are also significant differences: • # of people to interact with not limited by distance or time • a person can ‘block’ or ‘manage’ relationships • personae subject to different social norms • personae can evolve over time • personae are less (not) limited in scope Monday, February 11, 13
  • 5. why do we share? friends online vs offline world? Monday, February 11, 13
  • 6. Why Public Connections ... serve as important identity signals help people navigate the networked social world serve to validate identity information about people Monday, February 11, 13
  • 7. Ludy Rohling what is the driver for sharing? Social Networks Serendipity vs. Privacy Monday, February 11, 13
  • 8. Multiple SN Accounts • Users have many accounts on different social & professional network services, e.g. personae for different situations/contexts • They utilize their different accounts in different ways, depending on the digital context, e.g.: • friendly chat on Facebook • professional discussion on LinkedIn • dating interactions on Hives As a consequence there is a need to separate the systems to manage the user's profiles, identities & permissions, as well as their social graph (relationships) & their social media Monday, February 11, 13
  • 9. Problems • Maintaining a multitude of online profiles for different contexts is cumbersome and time consuming - not scalable • It is difficult for new social networks to attract new & maintain active members simply because of the effort involved in creating and maintaining "yet-another-profile" and re-establishing different aspects of your profile under yet another context • A user cannot control how their information is viewed by others in different contexts by different social applications Monday, February 11, 13
  • 10. Architecture Needed for managing multiple Social Web profiles “policy-oriented web” architecture to support trusted services in the longer term Monday, February 11, 13
  • 11. For example ... • In one system manage your personal information: • home address, telephone number, & best friends • your Friends Profile gets exposed to Hives and Twitter • In another system manage work-related information: • office address, office telephone number, & work colleagues • your Work Profile gets exposed to Plaxo and LinkedIn • Another choice could be to store your entire profile locally with a trusted third party, and then • your Health Profile can be exposed to health care providers • your Citizen Profile can be exposed to government services Monday, February 11, 13
  • 12. Social Web User http://www.w3.org/2005/Incubator/socialweb/wiki/SocialWebFrameworks2#Social_Graph_Management_Today Monday, February 11, 13
  • 13. Distributed Profile http://www.w3.org/2005/Incubator/socialweb/wiki/SocialWebFrameworks2#Social_Graph_Management_Today Monday, February 11, 13
  • 14. Social Graph https://www.google.com/settings/me http://www.w3.org/2005/Incubator/socialweb/wiki/SocialWebFrameworks2#Social_Graph_Management_Today Monday, February 11, 13
  • 15. Social Groups http://www.w3.org/2005/Incubator/socialweb/wiki/SocialWebFrameworks2#Social_Graph_Management_Today Monday, February 11, 13
  • 16. Frameworks http://www.w3.org/2005/Incubator/socialweb/wiki/SocialWebFrameworks2#Social_Graph_Management_Today Monday, February 11, 13
  • 17. Personal Profiles Monday, February 11, 13
  • 18. Opening the Sites Monday, February 11, 13
  • 19. Opening the Sites • Demand from application developers to make use of the amounts of Social Web data & make their applications available to the site members • Demand from users to reuse data and connections they have already established on other sites, e.g. Google+ download your data, Diaspora* download xml, download photos • In response: Facebook provided an API & Google OpenSocial API Monday, February 11, 13
  • 20. an open, decentralized standard for authenticating users that can be used for access control, allowing users to log on to different services with the same digital identity where these services trust the authentication body • making sure the users are who they say they are • http://openid.net/ • Initially: 2005, called Yadis (an acronym for "Yet another distributed identity system") Monday, February 11, 13
  • 21. with OpenID, the process starts with the application asking the user for their identity (typically an openid URI) http://openidexplained.com/ Monday, February 11, 13
  • 22. OAuth • an open protocol to allow secure API authorization in a standard method for web applications; it enables users to grant third-party access to their web resources without sharing their passwords • largely based on: Flickr’s API Auth & Google’s AuthSub • limitations in terms of complexity, user experience, scale • 3 flows merged into one: web-based apps, desktop clients & mobile/limited devices; e.g. when Facebook Connect existed - flows for web apps, mobile devices & game consoles • http://oauth.net/ Monday, February 11, 13
  • 23. OAuth 2.0 • OAuth 2.0 focuses on client developer simplicity - providing specific authorization flows for web & desktop applications, mobile phones & living room devices • not backwards compatible with previous versions • 6 New Flows • http://oauth.net/2/ the application directly requests a limited access OAuth Token (valet key) to access the APIs (enter the house) on user's behalf. If the user can grant that access, the application can retrieve the unique identifier for establishing the profile (identity) using the APIs. Monday, February 11, 13
  • 24. Twitter employing OAuth Figure credits: http://www.phpbuilder.com/columns/sachin_khosla062510.php3 Monday, February 11, 13
  • 25. Facebook Platform • Graph API - core of Facebook Platform, to read and write data to Facebook (simple and consistent view of the social graph) • Open Graph - defining Actions and Objects • Facebook Query Language (FQL) - SQL-style interface to query the data exposed by the Graph API • Authentication (now Facebook Login) - interact with Graph API on behalf of Facebook users (single-sign on mechanism for web, mobile & desktop apps) • Social Plugins, Facebook Payments, Ads API, Chat API (via Jabber/XMPP service), JavaScript SDK • Depreciated: REST API, FBML, and the old Javascript API, Facebook Connect APIs Monday, February 11, 13
  • 26. open standards-based (e.g. JavaScript, HTML) component model for cloud based social apps • Google initiative (set of APIs) in 2007: • People & Friends API (people and relationship information) • Activities API (publishing & accessing user activity information) • Persistence API (simple key-value pair data for server-free stateful applications) • with Open Social embedded in a site, a site instantly becomes a social Web site (initially running only at Orkut) • integrated, e.g. OAuth, OAuth 2.0, Activity Streams • http://www.opensocial.org/ Monday, February 11, 13
  • 27. OpenSocial • Half a year after Facebook Platform, Google launched Open Social • Popular containers (initially): MySpace, Hi5, Plaxo, LinkedIn, Orkut, Friendster, Six Apart • http://opensocial.org/category/showcase/ (currently) • Plugged-in applications: iLike, Slide, Flixter, Rock You, etc. • https://github.com/opensocial • Apache Shinding: reference implementation of OpenSocial Specification (Social Network APIs): • Apache Rave: lightweight extendible platform for using, integrating & hosting OpenSocial and W3C Widget services (context-aware personalization, collaboration & content integration capabilities) Monday, February 11, 13
  • 28. Twitter APIs • The Twitter platform offers access to the data of more than 200 million tweets a day, via different APIs • Each API represents a facet of Twitter • These APIs are constantly evolving, and developers have to be aware of that • http://dev.twitter.com Monday, February 11, 13
  • 29. REST API • the API for leveraging core Twitter objects • enables developers to access the core primitives of Twitter including timelines, status updates & user information, etc. • RESTful API calls to build a profile of a user: user name, user Twitter handle, user profile avatar & the graph of people that user is following on Twitter • enables developers integration opportunities to interact with Twitter: create & post tweets back to Twitter, reply to tweets, favorite certain tweets, retweet other tweets, etc. Monday, February 11, 13
  • 30. Streaming API • real-time sample of the Twitter Firehose • for developers with data intensive needs, e.g. to build a data mining product or do analytics research • allows for large quantities of keywords to be specified and tracked, retrieving geo- tagged tweets from a certain region, or have the public statuses of a user set returned • Public streams: public data flowing through Twitter. The primary use case is following specific users or topics, and data mining, e.g. public statuses from all users, filtered in various ways: by userid, keyword, geographic location • User streams: single-user streams (all data for a single user's view of Twitter; Requires the user's OAuth token); The primary use case is providing updates to a Twitter client • Site streams: multi-user version of user streams (for servers to connect to Twitter on behalf of many users); The primary use case is website and other service integrations • Connecting to the streaming API requires keeping a persistent HTTP connection open (different than the REST API) Monday, February 11, 13
  • 31. Search API • Dedicated API for running searches against the real-time index of recent Tweets; to allow a user to query for Twitter content: • a set of tweets with specific keywords, • tweets referencing a specific user, • tweets from a particular user • to access to data around Trends • it’s limited, e.g. index of only recent tweets (6-9 days); no authentication: all queries are made anonymously; some tweets & users may be missing from search results (focus on relevance) Monday, February 11, 13
  • 32. Twitter for Websites • TfW: a set of products that enables websites to easily integrate Twitter basic functions • Tweet button • Follow button • Embedded Tweets https://dev.twitter.com/docs/twitter-for-websites Monday, February 11, 13
  • 33. Issues related to User Profiles & Networks Monday, February 11, 13
  • 34. Privacy Concerns • Legal still in its infancy, but courts do rule on new behavior • fourth amendment to the U.S. Constitution & legal decisions concerning privacy are not equipped to address social network sites • e.g., do police officers have the right to access content posted to Facebook without a warrant? • Truthfulness of personal profiles has become a subject of debate • Privacy hard to understand (few read Terms) and misinterpret ‘Friends’ Monday, February 11, 13
  • 35. Security • security of people (sex offenders) • security of computers and data • With enormous numbers of users and enormous amounts of data, sites are natural targets of spammers, and phishing and malware attacks (‘new friend malware’, ‘twitter spam’ etc.) Monday, February 11, 13
  • 39. Thijs Kloosterman SNS for improving offline society Reinier Kop government protection vs. learning Monday, February 11, 13
  • 40. Bill of Rights • Fundamental aspects to consider for users of Social Web: • Ownership of their own personal information, including: • their own profile data • the list of people they are connected to • the activity stream of content they create • Control of whether & how personal information is shared with others • Freedom to grant persistent access to their personal information to trusted external sites http://opensocialweb.org/2007/09/05/bill-of-rights/ Monday, February 11, 13
  • 41. http://www.economist.com/blogs/babbage/2012/01/online-privacy 27-01-2012 “Having figured out how to remember nearly everything, Issues: it is about time people • burden on companies: it is next to relearned how to forget” impossible to rid the web completely of a piece of information: some digital ripples will inevitably remain “Personal data is the new oil • where one man’s data end and another’s begin of the internet and the new currency of the digital • crooks may try to invoke it to have their name struck from unfavorable world.” online coverage Meglena Kuneva, European • it is not always clear what counts as Consumer Commissioner, 2009 reporting on the internet Monday, February 11, 13
  • 42. current laws not working? media vs. piracy Egemen Uzunali Monday, February 11, 13
  • 43. Privacy: Awareness not Paranoia "privacy paradox" = lack of awareness of the public nature of Internet flexibility to handle friends with different conceptions of privacy ability to control data flow inside and outside network realize that sensitive information can be reconstructed Monday, February 11, 13
  • 44. Current Public Initiatives SOPA, PIPA, ACTA • By media industry: • AHRA 1992 - soft • DMCA 1998 - surgical • SOPA/PIPA 2011 - nuclear • By non representatives • ACTA - 39 countries Monday, February 11, 13
  • 50. are we really producers? Is it really social? Monday, February 11, 13
  • 51. “Carr argues that the Internet physically "rewires" our brain to where we end up acting like computers — avaricious gobblers of information –- and our grip on what it means to be human slackens.” Richard Foreman, playwright 2008 2010 Monday, February 11, 13
  • 52. Assignment 1 image source: http://www.flickr.com/photos/bionicteaching/1375254387/ Monday, February 11, 13
  • 53. Provide analysis of privacy issues on the (Social) Web • three articles <--> three mind maps <--> main Social Web privacy issues • write for people who didn’t attend the course (max 3 pages) • Provide analysis of current privacy-related public initiatives • legal contexts for privacy and ownership • compare the intentions of both initiatives (advantages & disadvantages) • your own vision on how this impacts the future of the social web • your own advise to policy makers with regards to privacy on the web. • links to Net Neutrality • link to Hands-on session: what would change if SOPA/PIPA or ACTA were active – would you still have access to the information you pulled in for the assignments? Illustrate your answer showing what changes could appear in the graph from exercise 4 (Hands-on session 2) and explain why. (max 1 page) • all visuals, e.g. screenshots, diagrams, etc. in appendix and use template  • Deadline: 22 February 23:59 Monday, February 11, 13
  • 54. Hands-on Teaser • Installations • Python 2.6 or 2.7 • Python packages: json, facebook, uurllib2 • JavaScript Info Vis Toolkit (jit.zip) • Facebook Developers app • Experience OAuth • Query the Facebook Open Graph • Visualize your Facebook social network in various ways image source: http://www.flickr.com/photos/bionicteaching/1375254387/ Monday, February 11, 13